Get in Touch

Course Outline

Introduction

  • Zero Trust vs. traditional perimeter security.

Overview of BeyondCorp Architecture and Design Principles

Understanding Network Segmentation

Implementing a Perimeterless Design

Knowing Users and Their Devices

Authenticating and Authorizing Users

Data Encryption

Maintaining Productivity While Improving Security

The User Experience

Troubleshooting

Summary and Next Steps

Requirements

  • A solid understanding of networking concepts.
  • A solid understanding of enterprise security.

Audience

  • Network engineers.
  • Cybersecurity professionals.
  • System architects.
  • IT managers.
 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories